books.google.com - A comprehensive introduction to the techniques of exploitation and creative problem-solving methods commonly referred to as "hacking," Hacking: The Art of Exploitation is for both technical and non-technical people who are interested in computer security. It shows how hackers exploit programs and write...http://books.google.com/books/about/Hacking.html?id=P8ijosP6ti4C&utm_source=gb-gplus-shareHacking

Hacking: The Art of Exploitation

A comprehensive introduction to the techniques of exploitation and creative problem-solving methods commonly referred to as "hacking," Hacking: The Art of Exploitation is for both technical and non-technical people who are interested in computer security. It shows how hackers exploit programs and write exploits, instead of just how to run other people's exploits. Unlike many so-called hacking books, this book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.

User ratings

5 stars

31

4 stars

18

3 stars

9

2 stars

2

1 star

4

Review: Hacking: The Art of Exploitation

User Review - Nour Ferhane - Goodreads

As we know there are two kinds of hackers , hacker-programmer : the person who develops and test what he programms and hacker-exploiter : he just exploits what programmers did , for me this book was awesome to read because it shows you many thing about programming interfaces for pentesting :)Read full review

Review: Hacking: The Art of Exploitation

User Review - عَبدُالكَرِيمْ الهاشمي - Goodreads

Hands down this is one of the best technical books I've read so far. The only missing part I think is: - no integer overflow exploitation - no details about recent techniques to bypass ASLR - some chapters are not about exploits or memory corruptionsRead full review

References to this book

About the author (2003)

Erickson has a formal education in computer science and speaks frequently at computer security conferences around the world. He currently works as a cryptologist and security specialist in Northern California.